Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
100% found this document useful (1 vote)
2K views

Software Requirement Home Security System Project

The document is a software requirements specification for a home security system using motion sensors. It describes the purpose and scope of creating a prototype system using a motion sensor camera, Arduino, GSM module, microcontroller and alarm controlled by a mobile app. The system functions by constantly monitoring the environment with a camera for any movement and sounding an alarm if motion is detected, while also sending a text message notification to the user. It allows users to activate and deactivate the alarm remotely using a security code. The specification outlines user classes, operating environment, design constraints, interfaces and functional and non-functional requirements.

Uploaded by

Ali Raza
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
2K views

Software Requirement Home Security System Project

The document is a software requirements specification for a home security system using motion sensors. It describes the purpose and scope of creating a prototype system using a motion sensor camera, Arduino, GSM module, microcontroller and alarm controlled by a mobile app. The system functions by constantly monitoring the environment with a camera for any movement and sounding an alarm if motion is detected, while also sending a text message notification to the user. It allows users to activate and deactivate the alarm remotely using a security code. The specification outlines user classes, operating environment, design constraints, interfaces and functional and non-functional requirements.

Uploaded by

Ali Raza
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

Software Requirements

Specification
for

Home security system (using


motion sensor)

Version 1.0 approved

Prepared by Muhammad Ali Raza

Submitted to Mam Fizza Shaukat

Institute of Space Technology Islamabad

25th December 2020


Software Requirements Specification for Home Security using Motion Sensing Page ii

Table of Contents
Table of Contents .......................................................................................................................... ii
Revision History ............................................................................................................................ ii
1. Introduction ..............................................................................................................................1
1.1 Purpose .......................................................................................................................................... 1
1.2 Document Convention: ................................................................................................................. 1
1.3 Intended Audience and Reading Suggestions ............................................................................... 1
1.4 Product Scope ............................................................................................................................... 1
2. Overall Description ..................................................................................................................2
2.1 Product Perspective ....................................................................................................................... 2
2.2 Product Functions ......................................................................................................................... 2
2.3 User Classes and Characteristics................................................................................................... 3
2.4 Operating Environment ................................................................................................................. 4
2.5 Design and Implementation Constraints ....................................................................................... 5
2.6 User Documentation ..................................................................................................................... 6
2.7 Assumptions and Dependencies.................................................................................................... 6
3. External Interface Requirements ...........................................................................................7
3.1 User Interfaces .............................................................................................................................. 7
3.2 Hardware Interfaces ...................................................................................................................... 7
3.3 Software Interfaces ....................................................................................................................... 7
3.4 Communications Interfaces........................................................................................................... 7
4. System Features .......................................................................................................................8
4.1 System Feature 1 ........................................................................................................................... 8
4.2 System Feature 2 (and so on) ........................................................................................................ 8
5. Other Nonfunctional Requirements .......................................................................................9
5.1 Performance Requirements ........................................................................................................... 9
5.2 Safety Requirements: .................................................................................................................... 9
5.3 Security Requirements .................................................................................................................. 9
5.4 Software Quality Attributes ........................................................................................................ 10

Revision History
Name Date Reason For Changes Version
Software Requirements Specification for Home Security using Motion Sensing Page 1

1. Introduction
1.1 Purpose
This document describes the software requirements for an automated Home Security system using Motion
Sensor and its Specification. This Software Requirements Specification (SRS) provides a description of all
the functions, specifications, external behaviors, design constraints, requirements (function and non-
functional) and other factors necessary to provide a complete and comprehensive description of the proposed
Home security system.
This document is written primarily as a learning project for the course Product Design and Development in
Avionics Engineering department faculty involved in the Home Security System: Miss Fizza Shaukat.
Further audiences for this document are the remaining stakeholders, such as developers, programmers,
integrators, operators, and maintainers of the proposed system.

1.2 Document Convention:


Main Section Title: Font Times New Roman Face: Bold Size: 18
Sub Section Title: Font Times New Roman Face: Bold Size: 14
Text Explanation: Font Times New Roman Face: Bold Size: 11

1.3 Intended Audience and Reading Suggestions


The intended audience of this SRS consists of:
Software Developers
Programmers
Integrators
Project managers
Operators
Marketing staff
Users
Testers
Maintainers
Documentation writers.

1.4 Product Scope


The scope of the Home Security System (HSS) is to create a prototype HSS environment using a motion
sensor Camera, Arduino, GSM, microcontroller, and Security alarm controlled under a single mobile
application. This prototype will be used to further develop the HSS, as well as initiate interest in smart home
appliances and product manufacturing and marketing to benefit others by providing state of the art
technology to keep their homes safe and secure by providing technology friendly environment in you grasp
controlled by one single mobile app.
Software Requirements Specification for Home Security using Motion Sensing Page 2

2. Overall Description
The project seeks to implement a remote home security using open-source electronic platform for houses and
different establishments. This study looked on different problems encountered by house owners with regards
to security such as targeted by the intruders/burglars because of the low-level security. To prevent crimes that
were illustrated by the proponents at the proposed project that would include the alarm and motion detects.
The siren alarm may be set on when an intruder/theft enters the house where motion is detected. The
homeowners will receive a message from the system to let the owners know that an intruder is entered their
property.

2.1 Product Perspective


The HSS network works autonomously It needs to cooperate with the software programming, manual parts,
and UI through housekeeping and mobile application. The deepened interfaces for the various frameworks
incorporate the manual alarm Siren, motion sensing camera, security and alarm system which incorporates
essential movement detecting algorithm that recognizes when somebody enters the region. At the point when
an interloper, intruder or a burglar is distinguished, it enacts an alarm and notify the approved individual
through SMS (Short Message Service).

2.2 Product Functions


The HSS motion sensor detects motion and sounds an alarm accordingly. This software system is designed in
C# and .net that constantly monitors an environment using a camera and sounds an alarm and even records
images of the motion taking place as soon as it takes place. The project works as follows:
The user first needs to set a security code.
As soon as the user sets the code and activates the system, monitoring starts.
The motion detector algorithm now constantly monitors the environment to check for any movement.
As soon any movement takes place in front of the camera the alarm is activated
Now the system sounds its alarm and even takes photos of the motion taking place.
The user receives a text and now needs to deactivate the alarm by entering the security code again.

2.2.1 Product Features

• Reports sent in seconds via pop up messages in mobile phone.


• It does support WI-FI and GPRS for mobile phone and Internet connection for Application server.
• Activate/deactivate alarm via internet keypad by using security code.
• Remote programming of the system
• Super-fast transmission speed
• Easy to install and set-up

2.2.2 APPLICATIONS

• Alarm signal reporting


• Open/Close signal reporting-Monitor by user code Latch-key reporting
• Polling loss notification-Monitor if you lose communication
• Supervisory by zone - Monitor a liquor, Gold, Cash, or gun cabinet in your home
Software Requirements Specification for Home Security using Motion Sensing Page 3

2.3 User Classes and Characteristics


2.3.1 Passwords

• Many users, security specialists and administrators rely on passwords to authenticate the identity of
those wishing to gain access to a security system.
• Passwords need to incorporate more than just letters for the greatest security, making use of numbers
and other symbols available on the keyboard.
• Those wishing to gain access by defeating the password security system may try commonly used
passwords, or to hack the password system in order to gain unauthorized entry.

2.3.2 Biometrics

• Biometric devices detect the identity of the person trying to gain access to a security system.
• In home security system, biometric scans a user's fingerprint to authenticate the person's identity
before allowing the user access to the system.

2.3.3 Certificates

• Third-party digital security companies (called certification authorities) issue digital certificates to
companies or individuals. Digital certificates vary in their complexity, depending on the security
needs of the individual or company.
• The certification authority issues a certificate that the user embeds on security system. When the user
attempts to gain access to secured areas on a network, or even secured websites, another software
program at the receiving end of the request validates the required digital certificate.

2.3.4 Smart cards

• An authorized individual may use a smart card to authenticate his identity in order to gain access to
secured devices or areas.
• Smart cards look much like a credit card and have a microchip and memory embedded in the card.
• The user inserts a smart card into a reader device and enters a password. A remote server checks the
smart card against the entered password.
• If the user enters incorrect passwords too many times in a row, the reader device can be programmed
to destroy the smart card to eliminate unauthorized access.
• If a user loses his smart card, a network administrator can turn the card off so it can no longer be
used to gain access to secured devices or areas.

2.3.5 Types of user required for Server machine:

➢ Database services
➢ The user passes the SQL requests as a message to the database server, the result of each SQL
command is returned to the same database server.
➢ communication services:
➢ when security alarm is in enable mode then the user passes the request as a calls or messages
to the apple device.
Software Requirements Specification for Home Security using Motion Sensing Page 4

2.4 Operating Environment


In our system we would be using following software and hardware:

2.4.1 Software

1. Objective C
➢ Objective-C’s features often allow for flexible, and often easy, solutions to programming
issues. Delegating methods to other objects and remote invocation can be easily
implemented using categories and message forwarding.
2. SQL server (2005/2008)
➢ SQL Server 2005 (codename Yukon), released in October 2005, is the successor to SQL
Server 2000. It included native support for managing XML data, in addition to relational
data. For this purpose, it defined an xml data type that could be used either as a data type in
database columns or as literals in queries. SQL Server 2008 also natively supports
hierarchical data
3. SQL light:
➢ A high-level overview of what SQLite is and why you might be interested in using it. This
document describes situations where SQLite is an appropriate database engine to use versus
situations where a client/server database engine might be a better choice.
4. Visual studio (2005/2008)
➢ Microsoft Visual Studio is an integrated development environment (IDE) from Microsoft. It
is used to develop console and graphical user interface applications along with Windows
Forms applications, web sites, web applications, and web services in both native codes
together with managed code for all platforms supported by Microsoft Windows, Windows
Mobile, Windows CE, .NET Framework, .NET Compact Framework and Microsoft
Silverlight.
5. Window 7 and above (min 01GB RAM)
➢ Internet access (fees may apply). Windows XP Mode requires an additional 1 GB of RAM
and an additional 15 GB of available hard disk space. PCs with multi-core processors. All
32-bit versions of Windows 7 can support up to 32 processor cores, while 64-bit versions
can support up to 256 processor cores.

2.4.2 Hardware:

1. Server (01GB RAM)


➢ A new, user-friendly Add Roles Wizard that helps you choose the services and features that
are necessary to run your applications. Application Server Foundation, the default
installation of Application Server that includes the .NET Framework 3.0/3.5 features.
2. Camera
➢ This device takes the images and videos of different areas and sends the updates to the server
as well as the device.
3. Sensor
➢ Mechanical device sensitive to light, temperature, radiation level, or the like, that transmits a
signal to measuring or control instrument
Software Requirements Specification for Home Security using Motion Sensing Page 5

2.5 Design and Implementation Constraints


2.5.1 Databases

1. SQL light-visual studio 2008/2010


➢ Visual Studio 2008 is focused on development of Windows Vista, 2007 Office system, and
Web applications. For visual design, a new Windows Presentation Foundation visual
designer and a new HTML/CSS editor influenced by Microsoft Expression Web are
included. J# is not included. Visual Studio 2010 features a new Help System replacing the
MSDN Library viewer. The Help System is no longer based on Microsoft Help 2 and does
not use Microsoft Document Explorer.
➢ The device will continuously update the server about the latest videos, calls, messages etc.
The user can access the data by entering the particular customer id and password on the server
website. The user can also get a back-up of data of whatsoever time and date needed.

2.5.2 System configurations

➢ security system has the ability to range from a simple motion sensor that turns on a light or an
alarm to an entire suite of detectors – motion, door/window sensors, glass-break, cameras –
setting off the most advanced applications employing cutting edge technology.
➢ Not only can your highly developed system activate lights and alarms, but also it has the
capability of notifying the proper emergency response team.
➢ You can also program your system to notify you about an intrusion or emergency via email,
cellular phone, instant message, or other online notifications. When you are trying to secure
your home, a home security system can go all the way.

2.5.3 Language requirements

➢ English

2.5.4 Communications protocols

➢ It should be voice alert and message alert inside Home security application.

2.5.5 Security considerations

1. burglary
➢ The system shoots an alarm in case a burglary takes place and sends an instant notification to
our mobile phone.
2. Breakdown
➢ In case someone intentionally tries to break the security system before barging inside the
system by default sends an alarm notification to the user.
Software Requirements Specification for Home Security using Motion Sensing Page 6

2.6 User Documentation


Once Development is completed, User manuals related to HSS and Online Help document will be
created to guide users with complete Prototype.

2.6.1 User mobile and computer

➢ Camera
➢ This device takes the images and videos of different areas and sends the updates to the server
as well as the device.
➢ Calls and messages settings
➢ The user receives instant information with an SMS or a notification on desired App.

2.6.2 Admin users operating Web Server

➢ Remove unnecessary services


➢ operating system installations and configurations are not secure.
➢ Switch off all unnecessary services and disable them, so next time the server is rebooted,
they are not started automatically. This will give an extra boost to your server performances,
by freeing some hardware resources.
➢ Monitor and audit the server
➢ All the logs present in a web server, should ideally be stored in a segregated area.
➢ All network services logs, website access logs, database server logs (e.g., Microsoft SQL
Server, MySQL, Oracle) and operating system logs should be monitored and checked
frequently.
➢ User accounts:
➢ Unused default user accounts created during an operating system install should be disabled.
➢ There is also a long list of software that when installed, user accounts are created on the
operating system.
➢ Such accounts should also be checked properly, and permissions need to be changed as pere
requirement.

2.7 Assumptions and Dependencies

• Hardware never fails


• The project was started with the assumption with necessary support in the form of hardware and
software resources so, it depends a lot on the inputs.
• User has the basic knowledge of the system environment. The users have sufficient knowledge of
security system.
• The home security system should have the product installed correctly.
• Whoever can interact with our home security systems such as the lightening system, phone system,
alarm etc. in enable mode.
Software Requirements Specification for Home Security using Motion Sensing Page 7

3. External Interface Requirements


3.1 User Interfaces
The first interface is the log-in screen. This is where the user has a specific Username and
Password so that they can gain access to the database. Then user can manage his/her profile.

3.2 Hardware Interfaces


The hardware should have the following specifications:
• Server (01GB RAM)
• Application server:
• IP camera
• Microcontroller
• Continuous power supply
• Ability to validate user

3.3 Software Interfaces


The software interfaces are specific to
• Objective C
• SQL server (2005/2008)
• SQ L light
• Visual studio 2008/2010
• Window 7 and above (min 1gb RAM)
• IOS and Android SDK(x-code)

3.4 Communications Interfaces


There is no restriction of the HSS network to a specific network protocol as long as the performance
requirements are satisfied.
The system uses a Wi-fi or GPRS connection to connect to the database. The code itself though, does not
specifically direct the network controllers to do any work.
The customer user interface should be intuitive, such that 99.9% of all new HSS users are able to complete
their installments of equipment, using its features, maintaining it and connection with wireless connection on
application without any assistance.
Software Requirements Specification for Home Security using Motion Sensing Page 8

4. System Features
The system features of the automated HSS are organized in the following way
General features, features for authorization, features for a transaction.

4.1 System Feature 1


4.1.1 Functional Requirements:

• Sound an alarm upon detection of intrusion.


➢ An audible alarm should sound immediately upon the triggering of any currently activated
sensor in the system to discourage further progress by the possible intruder.
• Contact law enforcement authorities.
➢ After a programmable delay period, the alarm must be able to automatically phone (or in some
other way contact) local law enforcement.
• Contact fire department.
➢ Without delay, the system must be able to automatically phone the local fire department when
smoke detectors indicate a possible fire. The remote alarm should allow for delay before
contacting authorities in case of a user triggered, false, or random alarm.
• Contact medical emergency services.
➢ A panic button will, again without delay, automatically summon an ambulance via phone
when pressed.
• Alert security company.
➢ The alarm will alert the security company on intrusion, fire, or emergency. In fact, the system
can summon police, fire, or ambulance via a call to the security company. Once again a user-
defined delay should be used.

4.2 System Feature 2 (and so on)

• Control and monitor all sensors.


➢ The system will be able to monitor and control all sensors currently marked as activated. Even
if a sensor is not currently activated, the system should monitor the status of that sensor.
• Control optional electrical appliances (lights, etc.)/.
➢ The system will be able to toggle external electrical appliances, such as lights or an additional
audible alarm to further deter intruders. This feature is necessary for vacationers as well as
those who leave their home vacant from time to time.
• Remote access.
➢ The user must be able to check the status of the system through a remote link via a mobile app
or remote control.

.
Software Requirements Specification for Home Security using Motion Sensing Page 9

5. Other Nonfunctional Requirements


5.1 Performance Requirements
It must be able to perform in adverse conditions like high low temperature etc.
Uninterrupted interrupted connections.

5.2 Safety Requirements:


➢ If you are going to be away from home for a few days, adjust your telephone ring to its lowest
volume setting. An unanswered phone may tip off a burglar that no one is home. Also, have a
neighbor or friend collect your newspaper and mail. Never cancel delivery - you do not know who
will get that information.
➢ Keep garage doors shut.
➢ Do not leave notes on the door for service people or family members. These alert the burglar that you
are not home.
➢ If out of the home for an extended period of time, create the illusion that someone may still be there.
Leave a TV or stereo on in the room where a burglar would most likely break in. Use exterior
lighting and motion detectors to minimize burglar concealment.
➢ Keep your alarms working properly.
➢ Test and maintain your sensor at least once a month or follow the manufacturer’s instructions.
sensor most often fail because of missing, dead, or disconnected batteries. Replace batteries at least
once a year. Testing is generally as simple as pushing a button and listening to hear the beep.
➢ Practice a fire escape plan.
➢ In addition to installing fire alarms in your home, you should develop a fire-escape plan and practice
it at least twice a year with all members of your household. In the event of a fire, every family
member should know at least two ways out of each room.
➢ Do not just buy one! There’s safety in numbers.

Install at least one fire alarm on each floor of the house or residence and outside all sleeping areas.
Some fire-safety advocates recommend installing fire alarms inside each sleeping area if sleeping
with the door closed.

5.3 Security Requirements

• Keyless entry to your front door


➢ The card is integrated to a home security system which activates entry. There is no need to
fumble with cumbersome sets of keys.
• Infrared motion sensors
➢ These can be a welcoming beacon of light for family and friends and a simple yet effective
deterrent for intruders.
• Security camera
• These should be installed at the front door in conjunction with a videophone that allows you
to communicate and see who is outside. You can now see who is at the door without leaving
the comfort of your seat.
Software Requirements Specification for Home Security using Motion Sensing Page 10

• Security system keypads


➢ These offer detection devices, audio and visual alarms with telephone dialers that alert
security-monitoring stations and call any telephone or mobile number to alert you of the
situation back at home.
• Home-safety devices
➢ Choose a device that provides emergency lighting to ensure you and your children don’t
have any accidents during a power failure.
• One safety switch
➢ These are now compulsory in new homes, but a smarter alternative is to use one safety
switch for each circuit. Your home will not be plunged into total darkness when the power is
cut due to one incident.

An added feature of safety switches is extension leads that come in handy when you’re using power
tools outdoors.
• Motion detector lights trouble shooting.
➢ Installing motion detector lights in the surroundings of your house is a total relief from the
fear of theft, intruders, lousy animals etc. These lights not only help you see through the
darkness but come on with an alarming bang in case of hunches. On the off chance if these
lights are malfunctioning, you need to troubleshoot the problems at your earliest

5.4 Software Quality Attributes


Some Software Quality attributes to consider are adaptability, availability, correctness, flexibility,
interoperability, maintainability, portability, reliability, reusability, robustness, testability, and
usability.
• Interface is accessible from at least one or more convenient places.
➢ This includes all of the home's common entry ways, bedrooms, and frequently used rooms.
If the system interface is not readily accessible, then it will not be as easy to control and will
offer little convenience.
• Interface and system must be properly connected to the sensors.
➢ It is essential to have secure wiring, preferably inside the walls, for reliable sensor
information to guard against false alarms and tampering.
• System must be connected to a device that can contact authorities.
➢ The system should be directly wired into the phone lines, preferably in such a way that will
not cut off phone usage from inside the house.
• System must have a backup power supply.
➢ The system needs to have a backup power supply capable of lasting at least 24 hours in order
to thwart attempts to bypass the security system by tampering with the power.
• Security related devices must be tamper-proof.
➢ Connections to the power supply and phone lines must be secure. The housing for the actual
security system and sensors must also be secure enough to withstand tampering.
Software Requirements Specification for Home Security using Motion Sensing Page 11

References:
http://en.wikipedia.org/wiki/Microsoft_SQL_Server
http://technet.microsoft.com/enus/library/cc770499(WS.10).aspx
http://hss.fatih.edu.tr/docs/pdf/srs.pdf
http://www.cs.colorado.edu/~kena/classes/6448/s01/examples/nickm3.pdf
http://www.cs.colorado.edu/~kena/classes/6448/s01/examples/tomp3.pdf
https://www.scribd.com/doc/76026766/Home-Security-SRS-documentation
https://t4tutorials.com/srs-documentation-of-home-automation-and-security-system-
android-project/#

You might also like